You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/azure-private-link-traffic-filters.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ The process of setting up the private connection with Azure Private link is spli
70
70
| 1. [Create a private endpoint using {{ecloud}} service alias.](#ec-private-link-azure-dns)||
71
71
| 2. [Create a DNS record pointing to the private endpoint](#ec-private-link-azure-dns). ||
72
72
|| 3. [Create a private connection policy.](#ec-azure-allow-traffic-from-link-id)|
73
-
|| 4. [Associate the Azure Private Link rule set with your deployments](#ec-azure-associate-traffic-filter-private-link-rule-set). |
73
+
|| 4. [Associate the Azure Private Link rule set with your deployments](#ec-associate-traffic-filter-private-link-rule-set). |
74
74
|| 5. [Interact with your deployments over Private Link.](#ec-azure-access-the-deployment-over-private-link)|
75
75
76
76
@@ -83,7 +83,7 @@ The process of setting up the private connection with Azure Private link is spli
83
83
Use [the service aliases for your region](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-private-link-azure-service-aliases). Select the **Connect to an Azure resource by resource ID or alias** option. For example for the region `eastus2` the service alias is `eastus2-prod-002-privatelink-service.64359fdd-7893-4215-9929-ece3287e1371.eastus2.azure.privatelinkservice`
84
84
85
85
::::{note}
86
-
The Private Link endpoint is created in the `Awaiting Approval` state. We validate and approve the endpoints when you create the private connection policy using the Private Link `resource name` and `resource ID`, as described in the next section [Create a private connection policy](#ec-azure-allow-traffic-from-link-id).
86
+
The Private Link endpoint is created in the `Awaiting Approval` state. We validate and approve the endpoints when you create the private connection policy using the Private Link `resource ID`, as described in the next section [Create a private connection policy](#ec-azure-allow-traffic-from-link-id).
87
87
::::
88
88
89
89
2. Create a DNS record.
@@ -111,7 +111,7 @@ Follow these high-level steps to add a private connection policy that can be ass
111
111
1.[Find your private endpoint resource ID](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-id).
112
112
2.[Create policies using the Private Link Endpoint resource ID](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-azure-create-traffic-filter-private-link-rule-set).
113
113
3.[Test the connection](#test-the-connection).
114
-
4.[Associate the private endpoint with your deployment](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-azure-associate-traffic-filter-private-link-rule-set).
114
+
4.[Associate the private endpoint with your deployment](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-associate-traffic-filter-private-link-rule-set).
115
115
116
116
### Find your private endpoint resource ID [ec-find-your-resource-id]
Copy file name to clipboardExpand all lines: deploy-manage/security/ece-filter-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Rule sets work as follows:
23
23
24
24
- Traffic filter rule sets, when associated with a deployment, will apply to all deployment endpoints, such as {{es}}, {{kib}}, APM Server, and others.
25
25
26
-
- Any traffic filter rule set assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint; deny all access over Private Link*. The implication is that if you make a mistake putting in the traffic source (for example, specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the rule sets.
26
+
- Any traffic filter rule set assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint*. The implication is that if you make a mistake putting in the traffic source (for example, specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the rule sets.
27
27
28
28
- You can mark a rule set as *default*. It is automatically attached to all new deployments that you create in its region. You can detach default rule sets from deployments after they are created. Note that a *default* rule set is not automatically attached to existing deployments.
Copy file name to clipboardExpand all lines: deploy-manage/security/gcp-private-service-connect-traffic-filters.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,7 +208,7 @@ Create a new private connection policy.
208
208
15. Click **Create**.
209
209
16. (Optional) You can [claim your Private Service Connect endpoint connection ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
210
210
211
-
The next step is to [associate the policy](#ec-associate-traffic-filter-private-link-rule-set) with your deployment.
211
+
The next step is to [associate the policy](#ec-psc-associate-traffic-filter-psc-rule-set) with your deployment.
212
212
213
213
### Optional: Associate a policy with a deployment [ec-psc-associate-traffic-filter-psc-rule-set]
Copy file name to clipboardExpand all lines: deploy-manage/security/network-security-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Policies operate on the proxy. Requests rejected by the policies are not forward
20
20
21
21
- You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
22
22
- Policies, when associated with a deployment or project, will apply to all endpoints, such as {{es}}, {{kib}}, APM Server, and others.
23
-
- Any policy assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint; deny all access over Private Link*. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
23
+
- Any policy assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint*. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
24
24
- You can [mark a policy as default](#default-network-security-policies). Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
0 commit comments